HCIE-Datacom

Here you have the best Huawei H12-891 practice exam questions

  • You have 40 total questions to study from
  • Each page has 5 questions, making a total of 8 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on May 20, 2025
  • This site is not affiliated with or endorsed by Huawei.
Question 1 of 40

For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be configured for data encryption if data is pushed based on gRPC.

    Correct Answer: A

Question 2 of 40

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

    Correct Answer: B

    In 6PE and 6VPE networking, VPN instances typically need to be created on PEs (Provider Edge routers). For 6VPE (IPv6 VPN Provider Edge), VPN instances are necessary to isolate and manage the IPv6 VPN traffic. These instances, known as Virtual Routing and Forwarding (VRF) tables, are used to store and process the routes for different VPNs. Therefore, the statement that no VPN instance needs to be created on PEs is false.

Question 3 of 40

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

    Correct Answer: B

    By default, the domain ID of an OSPF process is null, not the same as the process ID. You need to explicitly set a domain ID using the domain-id command in the OSPF process view if you want to assign a specific domain ID.

Question 4 of 40

VXLAN identifies tenants using VNIs, which are 24 bits long. A tenant can have one or more VNIs, and VXLAN supports a maximum of 12 million tenants.

    Correct Answer: B

    VXLAN identifies tenants using VNIs, which are indeed 24 bits long. However, a 24-bit identifier can support up to 16 million different values (2^24 = 16,777,216), not 12 million. Therefore, the statement that VXLAN supports a maximum of 12 million tenants is false.

Question 5 of 40

In the SSH algorithm negotiation phase, the SSH server and client exchange the list of algorithms that hey support. The list of symmetric encryption algorithms of the SSH server is as follows: aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. The list of symmetric encryption algorithms of the SSH client is as follows: aes128-ctr, aes192-ctr, aes256-ctr, and aes256-cbc. Which of the following symmetric encryption algorithms can be used by both the SSH server and client?

    Correct Answer: A, B, C, D

    The symmetric encryption algorithms that can be used by both the SSH server and client are those that appear in both lists. In this case, the algorithms that match are aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. Therefore, all the provided options are correct.